Security Considerations in Modular Mobile Manipulation
暂无分享,去创建一个
[1] Stefanie Tellex,et al. Scanning the Internet for ROS: A View of Security in Robotics Research , 2018, 2019 International Conference on Robotics and Automation (ICRA).
[2] Henrik I. Christensen,et al. SROS: Securing ROS over the wire, in the graph, and through the kernel , 2016, ArXiv.
[3] Peter Schartner,et al. Secure Data Recording and Bio-Inspired Functional Integrity for Intelligent Robots , 2018, 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[4] Peter Schartner,et al. Security for the Robot Operating System , 2017, Robotics Auton. Syst..
[5] Agostino Cortesi,et al. SROS1: Using and Developing Secure ROS1 Systems , 2019 .
[6] Jongkil Kim,et al. Security and Performance Considerations in ROS 2: A Balancing Act , 2018, ArXiv.
[7] Peter Fairley,et al. Cybersecurity at U.S. utilities due for an upgrade: Tech to detect intrusions into industrial control systems will be mandatory [News] , 2016 .
[8] Micael S. Couceiro,et al. On the Security of Robotic Applications Using ROS , 2018, Artificial Intelligence Safety and Security.
[9] Peter Schartner,et al. Secure communication for the robot operating system , 2017, 2017 Annual IEEE International Systems Conference (SysCon).
[10] Agostino Cortesi,et al. Procedurally Provisioned Access Control for Robotic Systems , 2018, 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[11] David Mascareñas,et al. A preliminary cyber-physical security assessment of the Robot Operating System (ROS) , 2013, Defense, Security, and Sensing.
[12] Bernhard Dieber,et al. Volatile memory forensics for the Robot Operating System , 2018, ArXiv.
[13] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[14] Nell Nelson,et al. The Impact of Dragonfly Malware on Industrial Control Systems , 2020 .
[15] Oussama Khatib,et al. Mobile manipulation: The robotic assistant , 1999, Robotics Auton. Syst..
[16] E. Byres,et al. The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .
[17] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.
[18] Gorka Olalde Mendia,et al. Towards an open standard for assessing the severity of robot security vulnerabilities, the Robot Vulnerability Scoring System (RVSS) , 2018, ArXiv.
[19] Erik Tews,et al. Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics , 2018, ArXiv.
[20] Vicente Matellán Olivera,et al. Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots , 2018, Front. ICT.
[21] Peter Schartner,et al. Application-level security for ROS-based applications , 2016, 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[22] Stamatis Karnouskos,et al. Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[23] Adriano Valenzano,et al. Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.
[24] Lander Usategui San Juan,et al. The shift in the robotics paradigm — The Hardware Robot Operating System (H-ROS); an infrastructure to create interoperable robot components , 2017, 2017 NASA/ESA Conference on Adaptive Hardware and Systems (AHS).